Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

The Realization Method of Strong Unforgeability of Revocable Proxy Signature

A proxy signature and implementation method technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of poor security and non-masquerading, and achieve the effect of strong non-masquerading

Inactive Publication Date: 2017-04-26
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the shortcomings of poor security of the existing revocable proxy signature method, the present invention provides a method for realizing the strong unforgeability of the revocable proxy signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The Realization Method of Strong Unforgeability of Revocable Proxy Signature
  • The Realization Method of Strong Unforgeability of Revocable Proxy Signature
  • The Realization Method of Strong Unforgeability of Revocable Proxy Signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific steps of the method for realizing the strong unforgeability of the revocable proxy signature of the present invention are as follows:

[0040] Glossary:

[0041] SEM: Security Mediator, Security Mediator;

[0042] KGC: Key Generation Center, Key Generation Center, is responsible for generating the public keys of original signer A and proxy signer B;

[0043] A: original signer;

[0044] B: proxy signer;

[0045] C: signature verifier;

[0046] sk A : private key of original signer A, including sk Ax and sk Ay two parts;

[0047] sk B : private key of proxy signer B, including sk Bx and sk By two parts;

[0048] pk A : The public key of the original signer A, including pk Ax and pk Ay two parts;

[0049] pk B : public key of proxy signer B, including pk Bx and pk By two parts;

[0050] π: system public parameters;

[0051] l: system security parameters selected by the key generation center KGC;

[0052] p: a large prime number selected b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high non-camouflage realization method of a revocable proxy signature, for solving the problem of poor security of a conventional method capable of revoking a proxy signature. The technical scheme comprises an original singer authorization process, an authorization verification process, a proxy signature generation process, a signature validity verification process and a proxy revoking process. According to the invention, by use of the same method, the authorization of an original signer to a proxy singer is generated, and a proxy signature is generated through introducing an anti-bump Hash function, so that an attacker is prevented from signature forgery in case that the attacker does not have the secret key of a user, thus the high-camouflage of a revocable proxy signature is realized, and it is proved that the proxy signature improves the security of the revocable proxy signature in a standard model.

Description

technical field [0001] The invention relates to a revocable proxy signature method, in particular to a method for realizing the strong unforgeability of the revocable proxy signature. Background technique [0002] Proxy signatures are often used to transfer signing rights from one party to another. With the development of e-commerce, proxy signature technology has become more and more widely used. The proxy signing process involves three entities: the original signer, the proxy signer, and the signature verifier. The original signer cannot sign in person for some reason, and the signature right is passed to the proxy signer, who signs on his behalf, and finally the signature verifier verifies the proxy signature and authorization. [0003] The document "Secure proxy signature scheme with fast revocation in the standard model, Journal of China Universities of Posts and Telecommunications, 2009, 16(4): 116-124" proposes a proxy signature scheme that authorizes revocation und...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 庞辽军周霞李慧贤
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products